Wolf et al., 2014 - Google Patents

Information technology security threats to modern e-enabled aircraft: A cautionary note

Wolf et al., 2014

View PDF
Document ID
14342151529931896198
Author
Wolf M
Minzlaff M
Moser M
Publication year
Publication venue
Journal of Aerospace Information Systems

External Links

Snippet

Most passengers, airlines, and the aircraft industry in general are used to very high safety standards and precautions surrounding aircraft systems. As the computerization of aircraft steadily progresses, the question of security (that is, the protection against intentional …
Continue reading at www.marko-wolf.de (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
Wolf et al. Information technology security threats to modern e-enabled aircraft: A cautionary note
Yağdereli et al. A study on cyber-security of autonomous and unmanned vehicles
Ajakwe et al. Drone transportation system: Systematic review of security dynamics for smart mobility
Strohmeier et al. Securing the air–ground link in aviation
Habler et al. Assessing aircraft security: A comprehensive survey and methodology for evaluation
Sampigethaya et al. Cyber security of unmanned aircraft system traffic management (UTM)
Haass et al. Aviation and cybersecurity: opportunities for applied research
Sampigethaya Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront
Mazzolin et al. A Survey of Contemporary Cyber Security Vulnerabilities and Potential Approaches to Automated Defence
Smith et al. Analyzing privacy breaches in the aircraft communications addressing and reporting system (acars)
Ryon et al. A safety-focused security risk assessment of commercial aircraft avionics
Elands et al. Technical aspects concerning the safe and secure use of drones
Constantinides et al. Security challenges in UAV development
Harison et al. Survey of cyber threats in air traffic control and aircraft communications systems
Schmidt Cyberterrorism: combating the aviation industry's vulnerability to cyberattack
Shah et al. Cybersecurity issues and challenges in civil aviation security
Ishtiaq et al. Cybersecurity Vulnerabilities and Defence Techniques in Aviation Industry
Haass et al. A framework for aviation cybersecurity
Efe et al. Air traffic security against cyber threats
Kuleshov et al. Cyber Attacks on Avionics Networks in Digital Twin Environment: Detection and Defense
Scott Aviation Cybersecurity: Regulatory Approach in the European Union
Johnson Civil aviation and cybersecurity
Batuwangala et al. Safety and Security considerations in the certification of next generation avionics and air traffic management systems
Limnaios Cybersecurity Considerations for Aerial Networks
Baron Garcia Machine Learning and Artificial Intelligence Methods for Cybersecurity Data within the Aviation Ecosystem